Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson’s machine.
What is the social engineering technique Steve employed in the above scenario?
Vincent_Lu
Highly Voted 1 year, 4 months agofortinetmaster
Highly Voted 1 year, 7 months agoCarl_Chang
Most Recent 2 days, 10 hours agoBinx
3 months, 2 weeks agoametah
5 months agoinsaniunt
10 months, 4 weeks agohellooooooods
1 year agoIPconfig
1 year agoAttila777
1 year, 1 month agovictorfs
1 year, 6 months agomikelpal
5 months, 1 week agoTafulu
1 year, 3 months agojeremy13
1 year, 6 months agosausageman
1 year, 7 months agoeli117
1 year, 7 months ago